2018 International Conference on Soft-Computing and Network Security (ICSNS) 2018
DOI: 10.1109/icsns.2018.8573687
|View full text |Cite
|
Sign up to set email alerts
|

Eshopping Scam Identification using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…In addition with the resource allocation, the surveillance networks need the security level to the atmost degree for the efficient and reliable communication. Many video sensor applications are equipped with sensors such as agricultural assisting robot [30], industrial automation [31,36], and smart vehicles [32,35] where security is not prioritized as it is dealt with the sensor data [37,39]. But in the sensitive applications such as military surveillance areas, cyber agencies and banking sectors the ocular and streaming data is the primary source which need high protection.…”
Section: Our Contributionsmentioning
confidence: 99%
“…In addition with the resource allocation, the surveillance networks need the security level to the atmost degree for the efficient and reliable communication. Many video sensor applications are equipped with sensors such as agricultural assisting robot [30], industrial automation [31,36], and smart vehicles [32,35] where security is not prioritized as it is dealt with the sensor data [37,39]. But in the sensitive applications such as military surveillance areas, cyber agencies and banking sectors the ocular and streaming data is the primary source which need high protection.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Subsequently, debate and discussion around using AI, public policies, and law and regulations to manage unauthorized access to financial services has also grown exponentially. Most research, however, focuses primarily on unauthorized rather than authorized transactions, which positions unauthorized access as the more pressing cybersecurity concern [32], [33], [34], [35]. Such a presupposition has led to an imbalance in research focus and meant that there remains a significant lack of research surrounding APP scams, especially from the technological perspective.…”
Section: App Scams: An Under-researched Cybersecurity Concernmentioning
confidence: 99%
“…The research and the experiments of VANETs are focused to utilize road safety information among vehicles to prevent accidents. The future vehicles will be equipped with sensors delivering various parameters (Balaanand et al 2015(Balaanand et al , 2018Maram et al 2019;Anupriya et al 2018), which will be displayed to the driver or transmitted to a RSU, which is a part of the VANET infrastructure. These parameters are also broadcasted to neighboring vehicles (Zeadally et al 2012).…”
Section: Vanets: An Overviewmentioning
confidence: 99%